US20210037082A1 - Method of sending media files - Google Patents
Method of sending media files Download PDFInfo
- Publication number
- US20210037082A1 US20210037082A1 US16/527,667 US201916527667A US2021037082A1 US 20210037082 A1 US20210037082 A1 US 20210037082A1 US 201916527667 A US201916527667 A US 201916527667A US 2021037082 A1 US2021037082 A1 US 2021037082A1
- Authority
- US
- United States
- Prior art keywords
- electronic device
- identification
- server
- identification datum
- datum
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/40—Information retrieval; Database structures therefor; File system structures therefor of multimedia data, e.g. slideshows comprising image and additional audio data
- G06F16/41—Indexing; Data structures therefor; Storage structures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/40—Information retrieval; Database structures therefor; File system structures therefor of multimedia data, e.g. slideshows comprising image and additional audio data
- G06F16/48—Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
Definitions
- the present invention relates generally to sending electronic data, and more particularly to a method of sending media files.
- a password is usually added to the media file which are then encapsulated into a compressed file (e.g., ZIP file and RAR file).
- a compressed file e.g., ZIP file and RAR file.
- the encrypted compressed file is transmitted to the specific user, and the password for decrypting is provided to the specific user as well.
- the user After receiving and open the compressed file from an electronic device, the user enters the password to decompress and restore the compressed file to the original media file so as to play the media file on the electronic device.
- the compressed file can provide encryption protection for the media file
- the primary objective of the present invention is to provide a method of sending media files which improves information security for sending media files.
- the present invention provides a method of sending media files, which includes the following steps.
- A. a first user obtains an identification code which is provide on and corresponding to an electronic tag by a first electronic device, and enters a first identification datum into the first electronic device, as well as selects a media file; the first electronic device transmits the identification code, the first identification datum, and the media file to a server;
- the server stores the media file and generates a recorded data set, wherein the recorded data set includes the identification code, the first identification datum, and a link information for the media file;
- a second user obtains the identification code which is provide on and corresponding to an electronic tag by a second electronic device, and enters a second identification datum into the second electronic device; the second electronic device transmits the identification code and the second identification datum to the server; and
- the server compares the identification code and the second identification datum transmitted from the second electronic device with the identification code and the first identification datum in the recorded data set, and if they are consistent, sends the link information for media file to the second electronic device; the second electronic device obtains the media file according to the received link information.
- the effect of the present invention is, the second user can obtain the media file only if the electronic tag is consistent with the second identification datum, which increases information security for obtaining media files. Even getting the electronic tag, the third party is unable to obtain the media file easily.
- FIG. 1 is a schematic diagram of the data management system and the connection structure thereof, to which the first preferred embodiment of the present invention is applied;
- FIG. 2 is a flow chart of the first preferred embodiment of the present invention
- FIG. 3 is a schematic diagram of the content of the database of the first preferred embodiment of the present invention.
- FIG. 4 is a flow chart of another part of the first preferred embodiment of the present invention besides the part in FIG. 2 ;
- FIG. 5 is a flow chart of the second preferred embodiment of the present invention.
- the data management system 100 includes a server 10 and a database 12 , wherein the server 10 is connected to the database 12 .
- the server 10 is connected to a network 20 in a wired or wireless manner.
- the server 10 is provided to process the data in the database 12 , and to store data in the database 12 .
- the database 12 shown in FIG. 1 of the first embodiment is independent of the server 10 . However, this is not a limitation on the present invention. In other words, the database 12 and the server 10 could be integrated into a host.
- a first electronic device 30 and a second electronic device 40 are respectively connected to the server 10 through the network 20 .
- the first electronic device 30 and the second electronic device 40 could be computers, smart phones, or tablets, which are networkable equipment connected through the network in a wired or wireless manner.
- the electronic device 30 is held by a first user, and the second electronic device 40 is held by a second user.
- the electronic device 30 has a first screen 32 and a first tag reading module 34 , wherein the first screen 32 is provided for displaying data.
- the first tag reading device 34 is provided for reading at least an electronic tag 50 in a contactless manner so as to obtain an identification code which is contained in and corresponding to the electronic tag 50 .
- the electronic tag 50 can be, for example, an RFID tag.
- the at least an electronic tag 50 can be used independently or with at least an object 60 .
- the at least an electronic tag 50 can be provided on or beside the at least an object 60 .
- the first tag reading module 34 can read a single or multiple electronic tags 50 at a time.
- the second electronic device 40 has a second screen 42 and a second tag reading module 44 , and the functions thereof are the same as the ones of the first electronic device 30 mentioned above.
- the aforementioned object 60 can be any article such as equipment and gift.
- a method of sending media files in this embodiment includes the following steps shown in FIG. 2 .
- Step S 11 the first user obtains an identification code which is provided on and corresponding to the electronic tag 50 through the first electronic device 30 , and enters a first identification datum into the first electronic device 30 , and selects a media file.
- the first electronic device 30 transmits the identification code, the first identification datum, and the media file to the server 10 .
- a user operates the first electronic device 30 and runs an application to read the electronic tag 50 with the first tag reading module 34 .
- the electronic device 30 can obtain the identification code and store it.
- the identification code can be manually entered into the first electronic device 30 by the first user.
- the identification code of the electronic tag 50 is printed on paper or the electronic tag, and the first user manually enters the identification code after viewing it.
- step S 11 the first user operates the first electronic device 30 to record video with a camera module (not shown) to create the media file.
- the first user enters the first identification datum into the first electronic device 30 as well as selects the recorded media file.
- the abovementioned first identification datum in this embodiment is an account, i.e., the account of the second user such as the account of the second user on the server, or the second user's account for communication, e.g., e-mail, Line, and WeChat.
- the first identification datum can be the second user's phone number.
- the method of inputting the account can be directly mutual entering, or obtaining by connecting the first electronic device 30 with the server.
- a plurality of user accounts are recorded in the server 10 previously, and after the first electronic device 30 is connected to the server 10 as well as logged in with the account of the first user, the server 10 transmits the other accounts to the first electronic device 30 . Accordingly, the first user selects one of the accounts (i.e., the account of the second user) through the first electronic device 30 .
- the first electronic device 30 transmits the identification code, the first identification datum, and the media file to the server 10 through the network 20 . Moreover, the first electronic device 30 can also transmit the first user's account to the server 10 .
- the media files can be voice files or multimedia files. Take voice files as an example, users can create the files with a recording module (not shown) of the first electronic device 30 .
- users can select the present media files in the first electronic device 30 .
- Step S 12 the server 10 stores the media file, and generates a recorded data set, wherein the recorded data set includes the identification code, the first identification datum, and a link information for the media file.
- the server 10 after receiving the media file, stores the media file in the database 12 , and generates the recorded data set D 01 as shown in FIG. 3 as well as stores it in the database.
- the recorded data set includes a plurality of fields, wherein the identification code “ID001” is recorded in field F 1 ; the first identification datum “YK02” is recorded in field F 2 ; the link information for the media file is recorded in field F 3 , which is represented as “DATA”.
- the server 10 receives the account of the first user, the first user's account “JF01” is then recorded in field F 4 .
- the server 10 generates a web address for the stored media file according to the media file, and uses the web address as the link information.
- the database 12 further includes a plurality of recorded data sets D 02 to D 04 which are respectively corresponding to the different identification codes “ID002” to “ID004”. Additionally, the content in fields F 2 to F 4 of the recorded data sets D 02 to D 04 is represented as “DATA”.
- the first user transfers the electronic tag 50 along with the object 60 to the second user; if the electronic tag 50 is used independently, the first user transfers the electronic tag 50 to the second user.
- Step S 13 the second user obtains the identification code which is provided on and corresponding to the electronic tag 50 by the second electronic device 40 , and enters a second identification datum into the second electronic device 40 .
- the second electronic device 40 transmits the identification code and the second identification datum to the server 10 .
- the second user after receiving the electronic tag 50 and the object 60 , the second user operates the second electronic device 40 and runs an application to start the second tag reading module 44 thereof. Therefore, the second electronic device 40 can read the electronic tag 50 to obtain the identification code and to store it.
- the second identification datum entered by the second user in the second electronic device 40 is an account (i.e., the account used to login the server 10 by the second user).
- the second electronic device 40 transmits the identification code and the second identification datum to the server 10 through the network 20 .
- the second identification datum can be the second user's account for communication, e.g., e-mail, Line, and WeChat, or the second user's phone number.
- Step S 14 the server 10 compares the identification code and the second identification datum transmitted from the second electronic device 40 with the identification code and the first identification datum in the recorded data set D 01 ; if the identification code and the second identification datum transmitted from the second electronic device 40 are consistent with the identification code and the first identification datum in the recorded data set D 01 , the server 10 sends the link information for the media file to the second electronic device 40 . The second electronic device 40 then obtains the media file according to the received link information.
- the identification code transmitted from the second electronic device 40 is “ID001”, and the second identification datum is “YK02”.
- the server 10 compares the identification code “ID001” with the recorded data sets D 01 to D 04 in the database 12 so as to find the corresponding recorded data set D 01 . Furthermore, after confirming the second identification datum “YK02” is consistent with the content “YK02” in field F 2 of the recorded data set D 01 , the server 10 then sends the link information in field F 3 to the second electronic device 40 .
- the second electronic device 40 obtains the media file according to the link information so as to play the file by displaying on the second screen 42 , and/or by playing the sound through a loudspeaker (not shown) of the second electronic device 40 . Accordingly, the second user will know the content of the media file that the first user wants to convey.
- the media file can be a film or voice file which introduces the object 60 or for operation instructions, in addition, the media file can also be a film or voice file with a message that the first user wants to communicate to the second user.
- the second identification datum has to be compared with the first identification datum, which increases information security for obtaining media files. Even getting the electronic tag 50 , the third party is unable to obtain the media file easily.
- Step S 14 of this embodiment further includes the following steps for improving information security.
- the server 10 compares the second identification datum transmitted from the second electronic device 40 with the first identification datum in the recorded data set D 01 , if the second identification datum is different from the first identification datum, the server 10 transmits a notification message to the second electronic device 40 so as to inform users that the second identification datum entered by the second user is incorrect, which is followed by the steps illustrated in FIG. 4 .
- Step S 141 the server 10 transmits a requests command to the second electronic device 40 so as to request the second user to re-enter the second identification datum into the second electronic device 40 , and then the second electronic device 40 transmits the second identification datum to the server 10 .
- Step S 142 the server 10 compares the second identification datum with the first identification datum in the recorded data set D 01 again; if the two identification datum are consistent, send the link information for the media file to the second electronic device 40 , while if they are different, re-performs the previous step S 141 .
- step S 141 can further includes the step of requesting the second electronic device 40 to obtain the identification code of the electronic tag 50 again, and transfer the identification code to the server 10 . Moreover, step S 141 can also include the step of comparing the identification code with the identification code of the recorded data set D 01 again.
- step S 142 if the second identification datum has been compared with and different from the first identification datum for many times in a row, the server 10 would terminate the access authority of the recorded data set D 01 so that the second electronic device 40 is unable to obtain the media file. After terminating the access authority of the recorded data set D 01 , the server 10 transmits a notification message to the first electronic device 30 so as to inform the first user that the media file cannot be sent to the second electronic device 40 .
- steps S 21 to S 24 are roughly the same as the ones in the first embodiment.
- the first identification datum can be an enabling code.
- the first identification datum is the enabling code, wherein the enabling code can be entered into the first electronic device 30 by the first user personally, or generated by the first electronic device 30 itself.
- the first user transmits the enabling code to the second electronic device 40 from the first electronic device 30 .
- step S 23 the second user can thus enter the second identification datum which includes the second user's account and the enabling code into the second electronic device 40 .
- step S 24 if the server 10 compares the enabling code of the second identification datum with the first identification datum as well as confirms they are consistent, the server 10 not only sends the link information to the second electronic device 40 but also changes the first identification datum in the recorded data set D 01 into the account of the second user.
- the server 10 transmits the changed first identification datum (i.e., the second user's account) to first electronic device 30 . Therefore, the first user can send the media file to the second user as well as know the account of the second user.
- the changed first identification datum i.e., the second user's account
- the second electronic device 40 can obtain the link information for the media file.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Multimedia (AREA)
- Data Mining & Analysis (AREA)
- Databases & Information Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Library & Information Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Software Systems (AREA)
- Storage Device Security (AREA)
Abstract
Description
- The present invention relates generally to sending electronic data, and more particularly to a method of sending media files.
- With the advancement of technology, network technology has flourished, and information transmission has also become more and more convenient. Through a variety of communication software, users can send media files such as video files and voice files to other users at will for sharing information.
- However, for a media file to be shared with a specific user, a password is usually added to the media file which are then encapsulated into a compressed file (e.g., ZIP file and RAR file). Next, the encrypted compressed file is transmitted to the specific user, and the password for decrypting is provided to the specific user as well. After receiving and open the compressed file from an electronic device, the user enters the password to decompress and restore the compressed file to the original media file so as to play the media file on the electronic device.
- In the above, although the compressed file can provide encryption protection for the media file, there is still a decryption software which can decrypt the compressed file. Therefore, the third party can decrypt the compressed file with the decryption software to obtain the media file without the password, and even post the media file on the Internet, so that others can download it, which results in the leak of privacy.
- In view of the above, the primary objective of the present invention is to provide a method of sending media files which improves information security for sending media files.
- The present invention provides a method of sending media files, which includes the following steps.
- A. a first user obtains an identification code which is provide on and corresponding to an electronic tag by a first electronic device, and enters a first identification datum into the first electronic device, as well as selects a media file; the first electronic device transmits the identification code, the first identification datum, and the media file to a server;
- B. the server stores the media file and generates a recorded data set, wherein the recorded data set includes the identification code, the first identification datum, and a link information for the media file;
- C. a second user obtains the identification code which is provide on and corresponding to an electronic tag by a second electronic device, and enters a second identification datum into the second electronic device; the second electronic device transmits the identification code and the second identification datum to the server; and
- D. the server compares the identification code and the second identification datum transmitted from the second electronic device with the identification code and the first identification datum in the recorded data set, and if they are consistent, sends the link information for media file to the second electronic device; the second electronic device obtains the media file according to the received link information.
- The effect of the present invention is, the second user can obtain the media file only if the electronic tag is consistent with the second identification datum, which increases information security for obtaining media files. Even getting the electronic tag, the third party is unable to obtain the media file easily.
- The present invention will be best understood by referring to the following detailed description of some illustrative embodiments in conjunction with the accompanying drawings, in which
-
FIG. 1 is a schematic diagram of the data management system and the connection structure thereof, to which the first preferred embodiment of the present invention is applied; -
FIG. 2 is a flow chart of the first preferred embodiment of the present invention; -
FIG. 3 is a schematic diagram of the content of the database of the first preferred embodiment of the present invention; -
FIG. 4 is a flow chart of another part of the first preferred embodiment of the present invention besides the part inFIG. 2 ; and -
FIG. 5 is a flow chart of the second preferred embodiment of the present invention. - As shown in
FIG. 1 , adata management system 100 and the connection structure thereof, to which the first preferred embodiment of the present invention is applied, are illustrated. Thedata management system 100 includes aserver 10 and adatabase 12, wherein theserver 10 is connected to thedatabase 12. Theserver 10 is connected to anetwork 20 in a wired or wireless manner. Theserver 10 is provided to process the data in thedatabase 12, and to store data in thedatabase 12. Thedatabase 12 shown inFIG. 1 of the first embodiment is independent of theserver 10. However, this is not a limitation on the present invention. In other words, thedatabase 12 and theserver 10 could be integrated into a host. - A first
electronic device 30 and a secondelectronic device 40 are respectively connected to theserver 10 through thenetwork 20. The firstelectronic device 30 and the secondelectronic device 40 could be computers, smart phones, or tablets, which are networkable equipment connected through the network in a wired or wireless manner. - The
electronic device 30 is held by a first user, and the secondelectronic device 40 is held by a second user. Theelectronic device 30 has afirst screen 32 and a firsttag reading module 34, wherein thefirst screen 32 is provided for displaying data. The firsttag reading device 34 is provided for reading at least anelectronic tag 50 in a contactless manner so as to obtain an identification code which is contained in and corresponding to theelectronic tag 50. Theelectronic tag 50 can be, for example, an RFID tag. The at least anelectronic tag 50 can be used independently or with at least anobject 60. For example, the at least anelectronic tag 50 can be provided on or beside the at least anobject 60. In practice, there can be a plurality ofelectronic tags 50, and theelectronic tags 50 can be used with a plurality ofobjects 60 respectively. The firsttag reading module 34 can read a single or multipleelectronic tags 50 at a time. The secondelectronic device 40 has asecond screen 42 and a secondtag reading module 44, and the functions thereof are the same as the ones of the firstelectronic device 30 mentioned above. - The
aforementioned object 60 can be any article such as equipment and gift. - By the above structure, a method of sending media files in this embodiment includes the following steps shown in
FIG. 2 . - Step S11: the first user obtains an identification code which is provided on and corresponding to the
electronic tag 50 through the firstelectronic device 30, and enters a first identification datum into the firstelectronic device 30, and selects a media file. The firstelectronic device 30 transmits the identification code, the first identification datum, and the media file to theserver 10. - In this embodiment, a user operates the first
electronic device 30 and runs an application to read theelectronic tag 50 with the firsttag reading module 34. Thus, theelectronic device 30 can obtain the identification code and store it. Practically, the identification code can be manually entered into the firstelectronic device 30 by the first user. For example, the identification code of theelectronic tag 50 is printed on paper or the electronic tag, and the first user manually enters the identification code after viewing it. - In this step S11, the first user operates the first
electronic device 30 to record video with a camera module (not shown) to create the media file. Next, the first user enters the first identification datum into the firstelectronic device 30 as well as selects the recorded media file. - The abovementioned first identification datum in this embodiment is an account, i.e., the account of the second user such as the account of the second user on the server, or the second user's account for communication, e.g., e-mail, Line, and WeChat. In practice, the first identification datum can be the second user's phone number.
- The method of inputting the account can be directly mutual entering, or obtaining by connecting the first
electronic device 30 with the server. For example, a plurality of user accounts are recorded in theserver 10 previously, and after the firstelectronic device 30 is connected to theserver 10 as well as logged in with the account of the first user, theserver 10 transmits the other accounts to the firstelectronic device 30. Accordingly, the first user selects one of the accounts (i.e., the account of the second user) through the firstelectronic device 30. - Afterward, the first
electronic device 30 transmits the identification code, the first identification datum, and the media file to theserver 10 through thenetwork 20. Moreover, the firstelectronic device 30 can also transmit the first user's account to theserver 10. - Besides video files, the media files can be voice files or multimedia files. Take voice files as an example, users can create the files with a recording module (not shown) of the first
electronic device 30. - In addition to recording the media files directly, users can select the present media files in the first
electronic device 30. - Step S12: the
server 10 stores the media file, and generates a recorded data set, wherein the recorded data set includes the identification code, the first identification datum, and a link information for the media file. - In this embodiment, after receiving the media file, the
server 10 stores the media file in thedatabase 12, and generates the recorded data set D01 as shown inFIG. 3 as well as stores it in the database. The recorded data set includes a plurality of fields, wherein the identification code “ID001” is recorded in field F1; the first identification datum “YK02” is recorded in field F2; the link information for the media file is recorded in field F3, which is represented as “DATA”. Furthermore, if theserver 10 receives the account of the first user, the first user's account “JF01” is then recorded in field F4. - The
server 10 generates a web address for the stored media file according to the media file, and uses the web address as the link information. - In this embodiment, the
database 12 further includes a plurality of recorded data sets D02 to D04 which are respectively corresponding to the different identification codes “ID002” to “ID004”. Additionally, the content in fields F2 to F4 of the recorded data sets D02 to D04 is represented as “DATA”. - Afterward, the first user transfers the
electronic tag 50 along with theobject 60 to the second user; if theelectronic tag 50 is used independently, the first user transfers theelectronic tag 50 to the second user. - Step S13: the second user obtains the identification code which is provided on and corresponding to the
electronic tag 50 by the secondelectronic device 40, and enters a second identification datum into the secondelectronic device 40. The secondelectronic device 40 transmits the identification code and the second identification datum to theserver 10. - In this embodiment, after receiving the
electronic tag 50 and theobject 60, the second user operates the secondelectronic device 40 and runs an application to start the secondtag reading module 44 thereof. Therefore, the secondelectronic device 40 can read theelectronic tag 50 to obtain the identification code and to store it. The second identification datum entered by the second user in the secondelectronic device 40 is an account (i.e., the account used to login theserver 10 by the second user). Afterward, the secondelectronic device 40 transmits the identification code and the second identification datum to theserver 10 through thenetwork 20. The second identification datum can be the second user's account for communication, e.g., e-mail, Line, and WeChat, or the second user's phone number. - Step S14: the
server 10 compares the identification code and the second identification datum transmitted from the secondelectronic device 40 with the identification code and the first identification datum in the recorded data set D01; if the identification code and the second identification datum transmitted from the secondelectronic device 40 are consistent with the identification code and the first identification datum in the recorded data set D01, theserver 10 sends the link information for the media file to the secondelectronic device 40. The secondelectronic device 40 then obtains the media file according to the received link information. - For example, the identification code transmitted from the second
electronic device 40 is “ID001”, and the second identification datum is “YK02”. Theserver 10 compares the identification code “ID001” with the recorded data sets D01 to D04 in thedatabase 12 so as to find the corresponding recorded data set D01. Furthermore, after confirming the second identification datum “YK02” is consistent with the content “YK02” in field F2 of the recorded data set D01, theserver 10 then sends the link information in field F3 to the secondelectronic device 40. - Thus, the second
electronic device 40 obtains the media file according to the link information so as to play the file by displaying on thesecond screen 42, and/or by playing the sound through a loudspeaker (not shown) of the secondelectronic device 40. Accordingly, the second user will know the content of the media file that the first user wants to convey. - For example, the media file can be a film or voice file which introduces the
object 60 or for operation instructions, in addition, the media file can also be a film or voice file with a message that the first user wants to communicate to the second user. - Most importantly, the second identification datum has to be compared with the first identification datum, which increases information security for obtaining media files. Even getting the
electronic tag 50, the third party is unable to obtain the media file easily. - Besides the aforementioned steps, Step S14 of this embodiment further includes the following steps for improving information security.
- After the
server 10 compares the second identification datum transmitted from the secondelectronic device 40 with the first identification datum in the recorded data set D01, if the second identification datum is different from the first identification datum, theserver 10 transmits a notification message to the secondelectronic device 40 so as to inform users that the second identification datum entered by the second user is incorrect, which is followed by the steps illustrated inFIG. 4 . - Step S141: the
server 10 transmits a requests command to the secondelectronic device 40 so as to request the second user to re-enter the second identification datum into the secondelectronic device 40, and then the secondelectronic device 40 transmits the second identification datum to theserver 10. - Step S142: the
server 10 compares the second identification datum with the first identification datum in the recorded data set D01 again; if the two identification datum are consistent, send the link information for the media file to the secondelectronic device 40, while if they are different, re-performs the previous step S141. - The above step S141 can further includes the step of requesting the second
electronic device 40 to obtain the identification code of theelectronic tag 50 again, and transfer the identification code to theserver 10. Moreover, step S141 can also include the step of comparing the identification code with the identification code of the recorded data set D01 again. - Besides, in step S142, if the second identification datum has been compared with and different from the first identification datum for many times in a row, the
server 10 would terminate the access authority of the recorded data set D01 so that the secondelectronic device 40 is unable to obtain the media file. After terminating the access authority of the recorded data set D01, theserver 10 transmits a notification message to the firstelectronic device 30 so as to inform the first user that the media file cannot be sent to the secondelectronic device 40. - By the aforementioned steps S141 to S142, the security of the sending method of the media files in this embodiment is further increased.
- As shown in
FIG. 5 , in the second embodiment, steps S21 to S24 are roughly the same as the ones in the first embodiment. The difference is, in step S21, the first identification datum can be an enabling code. For example, in the situation that the first user has no idea of the second user's account, the first identification datum is the enabling code, wherein the enabling code can be entered into the firstelectronic device 30 by the first user personally, or generated by the firstelectronic device 30 itself. In any step before step S23 (take step S21 as an example), the first user transmits the enabling code to the secondelectronic device 40 from the firstelectronic device 30. - In step S23, the second user can thus enter the second identification datum which includes the second user's account and the enabling code into the second
electronic device 40. - In step S24, if the
server 10 compares the enabling code of the second identification datum with the first identification datum as well as confirms they are consistent, theserver 10 not only sends the link information to the secondelectronic device 40 but also changes the first identification datum in the recorded data set D01 into the account of the second user. - Afterward, the
server 10 transmits the changed first identification datum (i.e., the second user's account) to firstelectronic device 30. Therefore, the first user can send the media file to the second user as well as know the account of the second user. - Thereafter, as long as the second user reads the
electronic tag 50 with the secondelectronic device 40, and enters the second user's account, and additionally, theserver 10 confirms the second user's account and the recorded data set D01 are consistent, the secondelectronic device 40 can obtain the link information for the media file. - The embodiments described above are only preferred embodiments of the present invention. All equivalent methods which employ the concepts disclosed in this specification and the appended claims should fall within the scope of the present invention.
Claims (11)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US16/527,667 US20210037082A1 (en) | 2019-07-31 | 2019-07-31 | Method of sending media files |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US16/527,667 US20210037082A1 (en) | 2019-07-31 | 2019-07-31 | Method of sending media files |
Publications (1)
Publication Number | Publication Date |
---|---|
US20210037082A1 true US20210037082A1 (en) | 2021-02-04 |
Family
ID=74258739
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/527,667 Abandoned US20210037082A1 (en) | 2019-07-31 | 2019-07-31 | Method of sending media files |
Country Status (1)
Country | Link |
---|---|
US (1) | US20210037082A1 (en) |
-
2019
- 2019-07-31 US US16/527,667 patent/US20210037082A1/en not_active Abandoned
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US12045811B2 (en) | Secure and confidential custodial transaction system, method and device using zero-knowledge protocol | |
US11107088B2 (en) | Open registry for internet of things | |
US8572685B2 (en) | Consolidated data services apparatus and method | |
CN103227939B (en) | For system, method and the infrastructure of real-time live broadcast stream content | |
JP5214228B2 (en) | Content distribution system | |
KR20190126317A (en) | Information processing device and information processing method | |
CN113193965A (en) | Digital content materialization display system based on NFT | |
US20170230444A1 (en) | Cloud service server and method for managing cloud service server | |
CN107181714A (en) | Verification method and device, the generation method of service code and device based on service code | |
US20170371625A1 (en) | Content delivery method | |
JP2003519877A (en) | A service providing device that allows another device to access unique information recorded on a portable recording medium in which the unique information is recorded, a method thereof, and the recording medium. | |
WO2010087257A1 (en) | Communication system, server device, display device, information processing method, and program | |
CN101957856A (en) | Authentication and personal content transmission method and display device thereof and server | |
CN108463970A (en) | The method and system of protection and retrieval secret information | |
US20080155699A1 (en) | Output System, Output Data Management Apparatus, Network Device, Output Data Management Program, Output Program, and Output Method | |
KR101346284B1 (en) | Method for producing an encrypted file and decrypting the encrypted file, computer readable recording medium a program for implementing the methods | |
CN110955909B (en) | Personal data protection method and block link point | |
US20040236828A1 (en) | Information processing system, information processing apparatus, information processing method, storage medium for information processing apparatus-readably storing program for practicing that method, and program therefor | |
US20220247736A1 (en) | Method and apparatus for sharing content data between networked devices | |
JP2007053658A (en) | Inquiry answering system, terminal, server, and program | |
JP2010066928A (en) | Server system, electronic equipment, communication terminal, and authentication method | |
US20210037082A1 (en) | Method of sending media files | |
TWI736901B (en) | How to transfer media files | |
JP2007293719A (en) | Digital media server and home network compatible apparatus | |
JP4819589B2 (en) | Authentication system and authentication method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: HONG, RONG-DER, TAIWAN Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:HONG, RONG-DER;LEE, CHIEN-HUNG;SIGNING DATES FROM 20190705 TO 20190731;REEL/FRAME:049918/0545 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |